MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 899b285e89b2d29903bf9f7b391fdaf9a9134b1e41085924fd8cdebc8cd29f8f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Gozi
Vendor detections: 6
| SHA256 hash: | 899b285e89b2d29903bf9f7b391fdaf9a9134b1e41085924fd8cdebc8cd29f8f |
|---|---|
| SHA3-384 hash: | 84ed8681d285f7276b8e7171b42ec371ed8ec5b92fbcb063b147f99c74f62d867cf7b36fce397d7ba7b4bc814f3bc0f3 |
| SHA1 hash: | 135853a9d5cca92c513993556266ccc8a0873146 |
| MD5 hash: | 78d279d18d0c606ddd02030b847e707f |
| humanhash: | berlin-high-tennessee-high |
| File name: | agenzia_delle_entrate.zip |
| Download: | download sample |
| Signature | Gozi |
| File size: | 553 bytes |
| First seen: | 2023-01-23 09:12:09 UTC |
| Last seen: | Never |
| File type: | zip |
| MIME type: | application/zip |
| ssdeep | 12:5jcFttJtynnXiN0unTuAZrcqObtB9tZzAF:9cFtkym0TuAZrcqObtBa |
| TLSH | T180F0E98942194B13C32EC7BBF5C4A07D1B21A869155B99A7072C0377444E378CE1A494 |
| TrID | 80.0% (.ZIP) ZIP compressed archive (4000/1) 20.0% (.PG/BIN) PrintFox/Pagefox bitmap (640x800) (1000/1) |
| Reporter | |
| Tags: | agenziaentrate Gozi Ursnif zip |
Intelligence
File Origin
# of uploads :
1
# of downloads :
101
Origin country :
ITFile Archive Information
This file archive contains 1 file(s), sorted by their relevance:
| File name: | agenzia_delle_entrate.url |
|---|---|
| File size: | 196 bytes |
| SHA256 hash: | a176d8492280d6d1dffa5718d60105d4075819d70367fb2a607ca043a6211f34 |
| MD5 hash: | d273f561c334583fb9a22ef1c32d08a2 |
| MIME type: | text/plain |
| Signature | Gozi |
Vendor Threat Intelligence
Verdict:
Likely Malicious
Threat level:
7.5/10
Confidence:
80%
Tags:
remote
Result
Verdict:
UNKNOWN
Link:
Threat name:
Script-JS.Trojan.Ursnif
Status:
Malicious
First seen:
2023-01-23 09:13:05 UTC
File Type:
Binary (Archive)
Extracted files:
1
AV detection:
6 of 26 (23.08%)
Threat level:
5/5
Detection(s):
Suspicious file
Result
Malware family:
gozi
Score:
10/10
Tags:
family:gozi botnet:7707 banker isfb trojan
Behaviour
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Checks computer location settings
Gozi
Malware Config
C2 Extraction:
checklist.skype.com
62.173.149.10
31.41.44.27
193.0.178.235
62.173.149.10
31.41.44.27
193.0.178.235
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Gozi
zip 899b285e89b2d29903bf9f7b391fdaf9a9134b1e41085924fd8cdebc8cd29f8f
(this sample)
Delivery method
Distributed via web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.